Please enable JavaScript.
Coggle requires JavaScript to display documents.
Types of Security Attack - Coggle Diagram
Types of Security Attack
-
b. Access Attack
Definition : An access attack occurs when someone (attacker) tries to gain unauthorized access to a component (devices), tries to gain unauthorized access to information on a component, or increases their privileges on a network component.
Example
- Password attack - password attacks can be implemented using a packet sniffer to yield user accounts and passwords that are transmitted as clear text. Or it refers to repeated attempts to identify a user account, password, or both (brute-force attacks)
- Trust Exploitation - compromise a trusted host, using it to stage attacks on other hosts in a network.
- Port Redirection - attacker taking network traffic coming into a host on one port and directing it out from another host. ( example : computer to the server)
- Man-in-the middle attack - middleman changing information that travel from original sender to original receiver. In a man in the middle attack, the intruder uses a program that appears to be the server to the client and appears to be the client to the server.
-
-
-
e. Malicious Code Attack
Definition : It is a program that inserted onto a host to damage a system, corrupt a system, replicate itself or deny services or access to networks systems or services.
Example
Virus : Self-replicating program that produces its own code by attaching copies of itself into other executable codes.
Worms : Spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.
Trojan Horse : Appear to be useful software but will actually do damage once installed or run on your computer.
-